diff --git a/README.md b/README.md index 9ea4291d..8ac12eb7 100644 --- a/README.md +++ b/README.md @@ -251,6 +251,8 @@ see https://github.com/future-architect/vuls/tree/master/docker ![Vuls-Architecture](img/vuls-architecture.png) +![Vuls-Scan-Flow](img/vuls-scan-flow.png) + ## [go-cve-dictinary](https://github.com/kotakanbe/go-cve-dictionary) - Fetch vulnerability information from NVD and JVN(Japanese), then insert into SQLite3. diff --git a/img/vuls-scan-flow.graphml b/img/vuls-scan-flow.graphml new file mode 100644 index 00000000..d9e7f7a2 --- /dev/null +++ b/img/vuls-scan-flow.graphml @@ -0,0 +1,369 @@ + + + + + + + + + + + + + + + + + + + + + + + Detect the OS + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + Get installed packages +Debian/Ubuntu: dpkg-query +Amazon/RHEL/CentOS: rpm +FreeBSD: pkg + + + + + + + + + + + + + + + + Get upgradable packages +Debian/Ubuntu: apt-get upgrade --dry-run +CentOS: yum check-upduate + + + + + + + + + + + + + + + + foreach +upgradable packages + + + + + + + + + + + + + + + + Get CVE IDs in the changelog +Debian/Ubuntu: aptitude changelog +CentOS: yum changelog + + + + + + + + + + + + + + + + end loop + + + + + + + + + + + + + + + + Select the CVE detail information + + + + + + + + + + + + + + + + Get CVE IDs by using package manager +Amazon/RHEL: yum plugin security +FreeBSD: pkg audit + + + + + + + + + + + + + + + + Vuls DB + + + + + + + + + + + + + + + + CVE DB (NVD / JVN) + + + + + + + + + + + + + + + + Insert results into DB +Reporting + + + + + + + + + + + + + + + + + + + + + + + + + + Debian +Ubuntu +CentOS + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + Amazon +RHEL +FreeBSD + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + diff --git a/img/vuls-scan-flow.png b/img/vuls-scan-flow.png new file mode 100644 index 00000000..8f361ffc Binary files /dev/null and b/img/vuls-scan-flow.png differ